메뉴 건너뛰기




Volumn , Issue , 2014, Pages 5018-5027

Cloud computing data protection - A literature review and analysis

Author keywords

[No Author keywords available]

Indexed keywords

DATA PROCESSING; SYSTEMS SCIENCE;

EID: 84902266783     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2014.616     Document Type: Conference Paper
Times cited : (13)

References (41)
  • 2
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • Buyya, R.; Yeo, C. S.; Venugopal, S.; Broberg, J.; Brandi, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation Computer Systems, 25(6), 2009, pp. 599-616.
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandi, I.5
  • 4
    • 84870205821 scopus 로고    scopus 로고
    • Cloud compliance: A framework for using cloud computing in a regulated world
    • N. Antonopoulos; L. Gillam (Eds.) Springer, London
    • Chaput, S. R.; Ringwood, K.: Cloud Compliance: A Framework for Using Cloud Computing in a Regulated World. In N. Antonopoulos; L. Gillam (Eds.): Cloud Computing - Principles, Systems and Applications. Springer, London, 2010, pp. 241-255.
    • (2010) Cloud Computing - Principles, Systems and Applications , pp. 241-255
    • Chaput, S.R.1    Ringwood, K.2
  • 5
    • 84858382654 scopus 로고    scopus 로고
    • The impact of cloud computing technology on legal infrastructure within internet - Focusing on the protection of information privacy
    • Harbin
    • Cheng, F.-C.; Lai, W.-H.: The Impact of Cloud Computing Technology on Legal Infrastructure within Internet - Focusing on the Protection of Information Privacy. In: Proceedings of the 2. International Workshop on Information and Electronics Engineering, Harbin, 2012, pp. 241-251.
    • (2012) Proceedings of the 2. International Workshop on Information and Electronics Engineering , pp. 241-251
    • Cheng, F.-C.1    Lai, W.-H.2
  • 6
    • 84872028984 scopus 로고    scopus 로고
    • Beyond location: Data security in the 21st century
    • Desai, D. R.: Beyond Location: Data Security in the 21st Century. In: Communications of the ACM, 56, 2013, pp. 34-36.
    • (2013) Communications of the ACM , vol.56 , pp. 34-36
    • Desai, D.R.1
  • 9
    • 0742274240 scopus 로고    scopus 로고
    • The european data privacy directive
    • Fromholz, J. M.: The European data privacy directive. In: Berkeley Technology Law, 15, 2000, pp. 461-484.
    • (2000) Berkeley Technology Law , vol.15 , pp. 461-484
    • Fromholz, J.M.1
  • 11
    • 84902288886 scopus 로고    scopus 로고
    • Zertifizierte Cloud durch das EuroCloud Star Audit SaaS
    • Giebichenstein, R.; Weiss, A.: Zertifizierte Cloud durch das EuroCloud Star Audit SaaS. In: Datenschutz und Datensicherheit - DuD, 35 (5), 2011, pp. 338-342.
    • (2011) Datenschutz und Datensicherheit - DuD , vol.35 , Issue.5 , pp. 338-342
    • Giebichenstein, R.1    Weiss, A.2
  • 12
    • 84902244477 scopus 로고    scopus 로고
    • European data protection 2.0: New compliance requirements in sight - What the proposed EU data protection regulation means for U.S. Companies
    • Gilbert, F.: European Data Protection 2.0: New Compliance Requirements in Sight - What the Proposed EU Data Protection Regulation Means for U.S. Companies. In: Santa Clara Computer & High Technology Law Journal, 28 (4), 2012, pp. 815-863.
    • (2012) Santa Clara Computer & High Technology Law Journal , vol.28 , Issue.4 , pp. 815-863
    • Gilbert, F.1
  • 13
    • 84994303265 scopus 로고    scopus 로고
    • Proposed EU data protection regulation: The good, the bad, and the unknown
    • Gilbert, F.: Proposed EU data protection regulation: the good, the bad, and the unknown. In: Journal of Internet Law, 15 (10), 2012, pp. 20-34.
    • (2012) Journal of Internet Law , vol.15 , Issue.10 , pp. 20-34
    • Gilbert, F.1
  • 14
    • 84979819408 scopus 로고    scopus 로고
    • International data protection regulation: Data transfer - Safe harbor
    • Grant, J. International data protection regulation: Data transfer - safe harbor. In: Computer Law & Security Review, 21 (3), 2005, pp. 257-261.
    • (2005) Computer Law & Security Review , vol.21 , Issue.3 , pp. 257-261
    • Grant, J.1
  • 15
    • 33846102423 scopus 로고    scopus 로고
    • The nature of theory in information systems
    • Gregor, S.: The nature of theory in information systems. In: MIS Quarterly, 30 (3), 2006, pp. 611-642.
    • (2006) MIS Quarterly , vol.30 , Issue.3 , pp. 611-642
    • Gregor, S.1
  • 16
    • 6344289986 scopus 로고    scopus 로고
    • Enhancing privacy and data protection in electronic medical environments
    • Gritzalis, S.: Enhancing Privacy and Data Protection in Electronic Medical Environments. In: Journal of Medical Systems, 28 (6), 2004, pp. 535-547.
    • (2004) Journal of Medical Systems , vol.28 , Issue.6 , pp. 535-547
    • Gritzalis, S.1
  • 18
    • 84865521711 scopus 로고    scopus 로고
    • Top 10 mistakes in system design from a privacy perspective and privacy protection goals
    • Camenisch, J. (Ed.) Springer, Berlin
    • Hansen, M.: Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals. In Camenisch, J. (Ed.): Privacy and Identity Management for Life. Springer, Berlin, 2012, pp. 14-31.
    • (2012) Privacy and Identity Management for Life , pp. 14-31
    • Hansen, M.1
  • 19
    • 84902260321 scopus 로고    scopus 로고
    • Starke Behörden, schwaches Recht - Der neue EU-Datenschutzentwurf
    • Härting, N.: Starke Behörden, schwaches Recht - der neue EU-Datenschutzentwurf. In: Betriebs-Berater, 67 (8), 2012, pp. 459-466.
    • (2012) Betriebs-Berater , vol.67 , Issue.8 , pp. 459-466
    • Härting, N.1
  • 20
    • 84902241120 scopus 로고    scopus 로고
    • The regulatory framework for privacy and security
    • Hunsinger J. (Ed.) Springer, Dordrecht
    • Hiller, J. S.: The Regulatory Framework for Privacy and Security. In Hunsinger J. (Ed.): International Handbook of Internet Research. Springer, Dordrecht, 2010, pp. 251-265.
    • (2010) International Handbook of Internet Research , pp. 251-265
    • Hiller, J.S.1
  • 21
    • 84902250754 scopus 로고    scopus 로고
    • Negotiating cloud contracts - Looking at clouds from both sides now
    • Hon, W. K.; Millard, C.; Walden, I.: Negotiating Cloud Contracts - Looking at Clouds from Both Sides Now. In: Stanford Technology Law Review, 16 (1), 2012, pp. 79-128.
    • (2012) Stanford Technology Law Review , vol.16 , Issue.1 , pp. 79-128
    • Hon, W.K.1    Millard, C.2    Walden, I.3
  • 24
    • 84902250672 scopus 로고    scopus 로고
    • Augmented environments and design
    • Lahlou, S. (Ed.) Springer, London
    • Lahlou, S.: Augmented Environments and Design. In Lahlou, S. (Ed.): Designing User Friendly Augmented Work Environments. Springer, London, 2010, pp. 1-29.
    • (2010) Designing User Friendly Augmented Work Environments , pp. 1-29
    • Lahlou, S.1
  • 26
    • 84865485500 scopus 로고    scopus 로고
    • Early lessons learned in the ENDORSE project: Legal challenges and possibilities in developing data protection compliance software
    • Camenisch, J. (Ed.) Springer, Berlin
    • Olislaegers, S.: Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software. In Camenisch, J. (Ed.): Privacy and Identity Management for Life. Springer, Berlin, 2012, pp. 73-87.
    • (2012) Privacy and Identity Management for Life , pp. 73-87
    • Olislaegers, S.1
  • 28
    • 84863498411 scopus 로고    scopus 로고
    • Privacy, security and trust in cloud computing
    • Pearson, S.; Yee, G. (Ed.) Springer, London
    • Pearson, S.: Privacy, Security and Trust in Cloud Computing. In Pearson, S.; Yee, G. (Ed.): Privacy and Security for Cloud Computing. Springer, London, 2013, pp. 3-42.
    • (2013) Privacy and Security for Cloud Computing , pp. 3-42
    • Pearson, S.1
  • 30
    • 84902297022 scopus 로고    scopus 로고
    • Datenschutzrechtliche Anforderungen an die Sicherheit der Kommunikation im Internet
    • Borges, G.; Schwenk, J. (Eds.) Springer, Berlin
    • Schneider, J.: Datenschutzrechtliche Anforderungen an die Sicherheit der Kommunikation im Internet. In Borges, G.; Schwenk, J. (Eds.): Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce. Springer, Berlin, 2012, pp. 21-42.
    • (2012) Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce , pp. 21-42
    • Schneider, J.1
  • 32
    • 7644223159 scopus 로고    scopus 로고
    • Maintaining privacy in pervasive computing - Enabling acceptance of sensor-based services
    • Soppera, A.; Burbridge, T.: Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-Based Services. In: BT Technology Journal, 22 (3), 2004, pp. 106-118.
    • (2004) BT Technology Journal , vol.22 , Issue.3 , pp. 106-118
    • Soppera, A.1    Burbridge, T.2
  • 34
    • 84865740013 scopus 로고    scopus 로고
    • Der Entwurf einer europäischen Datenschutz-Grundverordnung - Gefahren für die medizi-nische Forschung
    • Taupitz, J.: Der Entwurf einer europäischen Datenschutz- Grundverordnung - Gefahren für die medizi-nische Forschung. In: Medizinrecht, 30 (8), 2012, pp. 423-428.
    • (2012) Medizinrecht , vol.30 , Issue.8 , pp. 423-428
    • Taupitz, J.1
  • 37
    • 0012903874 scopus 로고    scopus 로고
    • Analyzing the past to prepare for the future: Writing a literature review
    • Webster, J.; Watson, R. T.: Analyzing the Past to Prepare For the Future: Writing a Literature Review. In: MIS Quarterly, 26 (2), 2002, pp. 13-23.
    • (2002) MIS Quarterly , vol.26 , Issue.2 , pp. 13-23
    • Webster, J.1    Watson, R.T.2
  • 38
    • 84902241182 scopus 로고    scopus 로고
    • Cloud Computing und Datenschutz
    • Weichert, T.: Cloud Computing und Datenschutz. In: Datenschutz und Datensicherheit - DuD, 34 (10), 2010, pp. 679-687.
    • (2010) Datenschutz und Datensicherheit - DuD , vol.34 , Issue.10 , pp. 679-687
    • Weichert, T.1
  • 40
    • 84979819344 scopus 로고    scopus 로고
    • International data transfers between the United States and the European union: Are the procedural provisions of the safe harbor solution adequate?
    • Zinser, A.: International data transfers between the United States and the European Union: are the procedural provisions of the Safe Harbor solution adequate?. In: Computer Law & Security Review, 20 (3), 2004, pp. 182-184.
    • (2004) Computer Law & Security Review , vol.20 , Issue.3 , pp. 182-184
    • Zinser, A.1
  • 41
    • 84927648796 scopus 로고    scopus 로고
    • Privacy protection goals and their implications for eID systems
    • Camenisch, J. (Ed.) Springer, Berlin
    • Zwingelberg, H.; Hansen, M.: Privacy Protection Goals and Their Implications for eID Systems. In Camenisch, J. (Ed.): Privacy and Identity Management for Life. Springer, Berlin, 2012, pp. 14-31.
    • (2012) Privacy and Identity Management for Life , pp. 14-31
    • Zwingelberg, H.1    Hansen, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.